$199

Need Custom Training for Your Team?

Get Quote

Call Us

Toll Free (844) 397-3739

Inquire About This Course

Instructor

Thumb 6611fa42 218f 4c21 8c58 3ae6e9769902

Douglas Humphrey

Douglas Humphrey is a cyber security executive at Hewlett Packard Enterprise in Palo Alto, CA, where he is Global Program Manager and Cyber Security Lead for HPE’s IoT Architecture Working Group. Douglas has 20 years of experience in high-technology and cyber security business management. He previously served as Chief Financial Officer and Director of Corporate Development at Spheric Security, a Silicon Valley startup, and as Co-Founder and Chief Operating Officer at askthecompany.com. HPE sponsored Douglas’ post-graduate studies in technology management at Stanford University, and he earned an MBA from Columbia Business School. In addition, he serves on the boards of several security start-ups.

Cyber Security for the IoT

Instructor: Douglas Humphrey

A first of its kind power packed step-by-step approach for securing the IoT

  • Learn how cyber security for the IoT works along with key technical details, process flows, definitions of terms and practical examples.
  • Follow an IoT cyber security change journey roadmap, a step-by-step approach for reaching your security goals.
  • Instructor is a cyber security executive at Hewlett Packard Enterprise. He has earned an MBA from Columbia Business School and studied technology management at Stanford University.

Course Description

This course presents a clear, precise and streamlined picture of how cyber security for the IoT works, while simultaneously providing a treasure trove of key technical details, process flows, definitions of terms and practical examples. This approach, combined with a handy reference, allows the student to quickly become a cyber security for the IoT leader.

What am I going to get from this course?
Following the course, students will be able to: 
- Demonstrate a command of IoT cyber security concepts
- Influence the direction of their organization’s IoT effort
- Follow an IoT cyber security change journey roadmap -- a step-by-step approach for reaching your security goals. This is heart of the course
- Describe how incident response and mitigation work in practice
- Demonstrate a leader’s confidence and knowledge around the progress that is being made towards a common IoT cyber security reference model
- Quickly move up the IoT security learning curve. Because this course is a first of its kind synthesis of comprehensive IoT cyber security knowledge and practice, presented in clear and compelling manner by an industry expert, the student can save enormous time and effort in achieving competence
 

Prerequisites and Target Audience

What will students need to know or do before starting this course?
There are no official prerequisites to the course. It would be beneficial, however, that students have some understanding of the fundamentals of IoT, including an appreciation of basic IoT use cases and a basic knowledge of networking. 
Who should take this course? Who should not?
This course is designed for working professionals focused on cyber security initiatives, including;
- Senior executives responsible for cyber security across the enterprise
- Product developers who need to understand the complexities of IoT from a customer perspective
- Enterprise architects charged with building new platforms
- Solutions information security engineers
In addition, all students who desire to more fully comprehend the intricacies of cyber security for the IoT will benefit.
 

Curriculum

Module 1: Course Objectives
Lecture 1 Course Overview & Objectives
04:37

Target audience, prerequisities, course description, takeaways from course

Module 2: Promise of IoT
Lecture 2 The Promise of IoT
06:01

Customer expectations, potential positive impacts of IoT, tradeoff of ROI and security

Module 3: IoT Cyber Security Concerns
Lecture 3 IoT Cyber Security Concerns
09:54

Broader attack surface, IoT as an evolution of IT, IoT security requirements

Module 4: Social Contract
Lecture 4 The Social Contract
07:00

Barriers to adoption of IoT, including security, data control & access, shared standards, safety & privacy

Module 5: Who will lead?
Lecture 5 Who Will Lead?
05:02

Corporate IoT security posture, IoT security leaders

Module 6: The Change Journey
Lecture 6 The Change Journey
15:03

STEP 1: Identify your IoT assets and cyber security objectives, STEP 2: Determine who may attack, common IoT attacks, STEP 3: Identify threats and vulnerabilities, STEP 4: Prevention & countermeasures

Module 7: Prevent
Lecture 7 Prevention & Countermeasures
07:37

Incidents & mitigation strategies, prevention relative to devices, gateways and cloud/apps

Module 8: Monitor
Lecture 8 Monitor
01:46

Monitor continuously, conduct penetration testing

Module 9: The Change Journey: Respond
Lecture 9 Respond
06:03

Disaster recovery & business continuity plans, roles & responsibilities, escalation procedures, achieving cyber resilience, compliance

Module 10: IoT Cyber Security Lifecycle
Lecture 10 IoT Cyber Security Lifecycle
04:06

S-SDLC, go-to-market speed or quality

Module 11: IoT Cyber Security Standards
Lecture 11 IoT Cyber Security Standards
08:03

Absence of a standard reference architecture, competing reference models, common basic model, OSI stack, emerging models

Module 12: Innovation
Lecture 12 Innovation
02:44

SIEM & IoT, Blockchain IoT cyber security tips

Module 13: Review & References
Lecture 13 Review & References
02:33
350